πŸ’»
Engineering Communications Program Team Projects
How To Hack WiFi
How To Hack WiFi
  • πŸ’»How to Hack WiFi Networks; Learning Password Security
  • Tutorial and Tips
    • πŸ‘‹Introduction
    • ▢️Start The Hack
      • πŸ‘©β€πŸ’»Necessary Installations
      • βš”οΈExecuting the Attack
    • πŸ”’Good Password Security
    • 🩹Mitigating The Damage
    • ❔Q&A
  • Wrapping It Up
    • πŸ™ŒConclusion
    • πŸ§‘β€πŸ«Extraneous Topics
    • πŸ‘₯Team Biography
    • πŸ“–References
Powered by GitBook
On this page
Export as PDF
  1. Wrapping It Up

Conclusion

What are the takeaways?

Now that you know how to crack a WiFi password, you can start to think about the mechanics of how hacking really works. Hacking is not mysterious bits of information floating down a screen in green text. There are tangible steps taken by real people every day to try and infiltrate and break into your systems.

By knowing the intimate processes that a hacker could take, you will know the tangible actions you can take to put roadblocks in the way of hackers.

In the case of passwords, making a complex password, utilizing special symbols, mixed-case, numbers, and making use of length, reduces the likelihood your password is in a given password list [12]. This makes it infeasible to guess your password within a reasonable time frame.

Moving beyond passwords though, you now also have a better understanding of online security. So much of your information is stored online, and most of it is protected by just a password. That single line of defense between you and any nefarious hackers out there is vital. So please, create strong passwords!

When websites recommend how to use a more complex password, heed their advice. You’ve now seen first-hand how easy it can be to crack a password. Make sure it doesn’t happen to you, and step by step, we move towards a safer online world.

Lastly, online security is an ever-changing world. You should continue to stay up to date in the latest security practices, and even consider using 2-factor-authentication as another tier of security beyond strong passwords [6]. Know that being safe with your passwords is just one piece of the puzzle, one link that hackers can attack. It is up to us as a whole to all be vigilant about our online security practices, and always seek more knowledge to stay up to date about what's going on in the world of computer security.

PreviousQ&ANextExtraneous Topics

Last updated 3 years ago

πŸ™Œ